Pass the ISC ISC Other Certification CSSLP Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions
Questions # 61:

Digital rights management (DRM) consists of compliance and robustness rules. Which of the following features does the robustness rule have? Each correct answer represents a complete solution. Choose three.

Options:

A.

It specifies the various levels of robustness that are needed for asset security.


B.

It specifies minimum techniques for asset security.


C.

It specifies the behaviors of the DRM implementation and applications accessing the implementation.


D.

It contains assets, such as device key, content key, algorithm, and profiling data.


Expert Solution
Questions # 62:

What are the security advantages of virtualization, as described in the NIST Information Security and Privacy Advisory Board (ISPAB) paper "Perspectives on Cloud Computing and Standards"? Each correct answer represents a complete solution. Choose three.

Options:

A.

It increases capabilities for fault tolerant computing.


B.

It adds a layer of security for defense-in-depth.


C.

It decreases exposure of weak software.


D.

It decreases configuration effort.


Expert Solution
Questions # 63:

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

Options:

A.

Cryptographer


B.

Cryptography


C.

Kerberos


D.

Cryptanalysis


Expert Solution
Questions # 64:

Which of the following is an example of penetration testing?

Options:

A.

Implementing NIDS on a network


B.

Implementing HIDS on a computer


C.

Simulating an actual attack on a network


D.

Configuring firewall to block unauthorized traffic


Expert Solution
Questions # 65:

Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.

Options:

A.

Evaluation and acceptance


B.

Programming and training


C.

Definition


D.

Initiation


Expert Solution
Questions # 66:

The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a sound SCM process is implemented? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Configuration status accounting


B.

Configuration change control


C.

Configuration identification


D.

Configuration audits


E.

Configuration implementation


F.

Configuration deployment


Expert Solution
Questions # 67:

Fred is the project manager of the CPS project. He is working with his project team to prioritize the identified risks within the CPS project. He and the team are prioritizing risks for further analysis or action by assessing and combining the risks probability of occurrence and impact. What process is Fred completing?

Options:

A.

Risk identification


B.

Risk Breakdown Structure creation


C.

Perform qualitative analysis


D.

Perform quantitative analysis


Expert Solution
Questions # 68:

Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information?

Options:

A.

Packet sniffing


B.

Keystroke logging


C.

Spoofing


D.

Wiretapping


Expert Solution
Questions # 69:

The Web resource collection is a security constraint element summarized in the Java Servlet Specification v2.4. Which of the following elements does it include? Each correct answer represents a complete solution. Choose two.

Options:

A.

HTTP methods


B.

Role names


C.

Transport guarantees


D.

URL patterns


Expert Solution
Questions # 70:

Which of the following terms ensures that no intentional or unintentional unauthorized modification is made to data?

Options:

A.

Non-repudiation


B.

Integrity


C.

Authentication


D.

Confidentiality


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions